The Bits and Bytes of Computer Networking

Networking Basics

1.

Question 1

Which protocol provides mechanisms ensuring data is reliably delivered?

1 / 1 point

Transmission Control Protocol (TCP)

Internet Protocol (IP)

Dynamic Host Configuration Protocol (DHCP)

User Datagram Protocol (UDP)

2.

Question 2

Select the right order of the TCP/IP Five-layer network model.

1 / 1 point

Physical Layer > Data link Layer > Transport Layer > Network Layer > Application Layer

Physical Layer > Data Link Layer > Network Layer > Transport Layer > Application Layer.

Physical Layer > Application Layer > Data link Layer > Network Layer > Transport Layer

Physical Layer > Network Layer > Data link Layer > Transport Layer > Application Layer

3.

Question 3

Which layer of the network model includes specifications for cables and connectors and how signals are sent over these connections?

1 / 1 point

Data link

Transport

Network

Physical

4.

Question 4

True or false: Fiber cables use pulses of light to represent the ones and zeros of data.

1 / 1 point

True

False

5.

Question 5

What is a network with only a single device at each end of the link called?

1 / 1 point

A switching hub

A collision domain

A twisted pair network

A point to point connection

6.

Question 6

Which of the following is a device that knows how to forward traffic between independent networks?

1 / 1 point

Router

Client

Switch

Hub

7.

Question 7

True or false: Most devices are purely a server or a client.

1 / 1 point

True

False

8.

Question 8

Fill in the blank: When data flows across a cable in both directions, this is known as_____ communication.

1 / 1 point

Duplex

Cross talk

Simplex

Ethernet

9.

Question 9

Fill in the blank: There will almost always be some troubleshooting data available through_____.

1 / 1 point

Action LEDs

Stop LEDs

Wire lights

Port lights

10.

Question 10

Which layer abstracts away the need for any other layers to care about what hardware is in use?

1 / 1 point

Physical

Data Link

Transport

Network

11.

Question 11

What does the letter B represent in a Media Access Control (MAC) address?

1 / 1 point

15

9

10

11

12.

Question 12

Which section in an ethernet frame contains the data from higher layers, such as Internet Protocol (IP) and the transport and application layers?

1 / 1 point

Preamble

Frame Check Sequence

Payload

EtherType

The Network Layer

1.

Question 1

What is eight bits of data called?

1 / 1 point

Octoploid

Octuplet

Figure eight

Octet

2.

Question 2

A single octet in an IP address represents what range of decimal numbers?

1 / 1 point

0-155

1-255

0-250

0-255

3.

Question 3

In a datagram, what does the flag field indicate?

1 / 1 point

If a datagram should be scanned for viruses

If a datagram has degraded and become unusable

If a datagram is high or low priority

If a datagram is allowed to or has already been fragmented

4.

Question 4

Which IP address is Class C?

1 / 1 point

172.38.14.72

128.42.39.72

192.37.48.98

224.24.45.69

5.

Question 5

What does ARP stand for?

1 / 1 point

Address Resolution Protocol

Augmented Resolution Picture

Anonymous Resource Protocol

Aggressive Resource Protection

6.

Question 6

What does CIDR stand for?

1 / 1 point

Classless Inter-Domain Routing

Classic Intra-Demo Ratings

Clear Inter-Developer Relations

Costless Inter-Data Routing

7.

Question 7

A router is performing basic routing functions. What is the first step in the transmission of a packet?

0 / 1 point

Check the routing table.

Sent an ARP response.

The router examines the destination IP of this packet.

A router receives a packet of data.

8.

Question 8

Interior gateway protocols are used by routers in order to share information within a single…

1 / 1 point

subnet

destination network

autonomous system

collision domain

9.

Question 9

What protocol communicates data between routers representing the edges of autonomous systems?

1 / 1 point

Distance-vector

Exterior gateway

Interior gateway

Link state

10.

Question 10

Which of the following IP address ranges have been defined as non-routable address space? Select all that apply.

1 / 1 point

172.16.0.0/12

255.255.255.0/1

10.0.0.0/8

192.168.0.0/16

The Transport and Application Layer

1.

Question 1

Nodes on a network have the ability to direct traffic toward many different receiving services. What provides this ability in the transport layer?

0 / 1 point

Demultiplexing

Multiplexing

Socket address

File Transfer

2.

Question 2

Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?

1 / 1 point

Source port

Sequence number

Acknowledgement number

Destination port

3.

Question 3

A Transmission Control Protocol (TCP) connection is established and two devices ensure that they’re speaking the same protocol. What has occurred?

1 / 1 point

Handwaving

Four-way handshake

Two-way handshake

Three-way handshake

4.

Question 4

A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

1 / 1 point

FIN_WAIT

CLOSED

CLOSE_WAIT

FINISHED

5.

Question 5

Connection-oriented protocols protect against dropped data by forming connections and using a constant stream of what?

1 / 1 point

Verifiers

Acknowledgements

Recognition

Approvals

6.

Question 6

In the OSI network model, the ________ is responsible for facilitating the communication between actual applications and the transport layer.

0 / 1 point

presentation layer

session layer

physical layer

application layer

7.

Question 7

One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed segments. Which Transmission Control Protocol (TCP) flag will be used?

1 / 1 point

SYN

RST

PSH

FIN

8.

Question 8

Application layer data lives in the _____ section of the transport layer protocol.

1 / 1 point

header

flags

footer

payload

9.

Question 9

Ports that are generally used to establish outbound connections are known as ______ ports.

1 / 1 point

registered

reserved

ephemeral

system

10.

Question 10

A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP) splits up the data into segments. Which field in the header helps keep track of the many segments?

1 / 1 point

Sequence number

Checksum

Urgent pointer

Acknowledgement number

The Five-Layer Network Model

Use the following scenario to answer the 10 questions below:

You have 3 networks (A, B, and C) and 2 routers (Y and Z).

Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.

Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.

Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.

The diagram graphically represents the connections between the networks (A, B, and C) and the routers (Y and Z).

1.

Question 1

Computer 1 on network A, with the IP address of 10.1.1.8, wants to send a packet to Computer 2, with the IP address of 10.1.1.10. On which network is computer 2?

1 / 1 point

Network C

Network B

Network A

Not present

2.

Question 2

For what purpose would computer 1 send a FF:FF:FF:FF:FF broadcast ARP message to all nodes on network A?

1 / 1 point

To obtain Router Y’s MAC address

To verify the internet connection

To calculate the TTL

To obtain Computer 2 MAC address

3.

Question 3

If it’s a TCP connection, which is the first segment that computer 1 needs to build?

1 / 1 point

Ethernet frame

IP datagram

TCP segment

handshake

4.

Question 4

What information is in the payload section of the TCP segments?

1 / 1 point

The application layer data

The MAC address of Computer 1

ART Table

Handshake

5.

Question 5

When constructing the Ethernet datagram to send the packet from Router Y to Router Z, what information needs to be in the destination MAC address?

1 / 1 point

Computer 2’s MAC address

Computer 1’s MAC address

Router Y’s MAC address

Router Z’s MAC address

6.

Question 6

Computer 1 on Network A sends a packet to Computer 2 on Network C. What’s the second step that Router Z does after receiving the Ethernet frame?

1 / 1 point

Calculates a checksum and compares this checksum with the one in the Ethernet frame header

Sends an ARP broadcast message

Sends back the packages to router Y for confirmation

Strips away the Ethernet frame, leaving the IP datagram. Performs a checksum calculation against the entire datagram

7.

Question 7

Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of 192.168.1.14. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?

1 / 1 point

65

63

0

61

8.

Question 8

Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 10.1.1.8. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the first TCP segment of data?

1 / 1 point

Source Port: 80

Destination Port: 5000

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 8081

Destination Port: 50

Sequence Number: 4

Acknowledgment Number: 1

Source Port: 80

Destination Port: 5000

Sequence Number: 1

Acknowledgment Number: 1

Source Port: 5000

Destination Port: 80

Sequence Number: 1

Acknowledgment Number: 2

9.

Question 9

Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 172.16.1.57. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?

1 / 1 point

Version: 5

Header Length: 16

Source IP Address: 10.1.1.0/24.

Destination IP address: 10.1.1.0/23.

Version: 4

Header Length: 20

Source IP Address: 192.168.1.121

Destination IP address: 172.16.1.57

Version: 6

Header Length: 20

Source IP Address: 8a:1a:2b:3c:4d:5f

Destination IP address: 2a:2b:3c:4d:8f

Version: 4

Header Length: 32

Source IP Address: 10.1.1.1

Destination IP address: 172.16.1.1

10.

Question 10

The Cat6 cable is part of the ______ layer.

1 / 1 point

Physical

Application

Network

Transport

Networking Services

1.

Question 1

A company moves a popular website to a new web host. Which of the following will change as a result?

1 / 1 point

Domain name

Network service

Internet Protocol (IP)

Root name server

2.

Question 2

During the name resolution process, which server does a local recursive server contact first?

1 / 1 point

Caching name server

Authoritative name server

Root name server

Top level domain (TLD) server

3.

Question 3

Which of these protocols is used by DNS?

1 / 1 point

Dynamic Host Configuration Protocol (DHCP)

IP (Internet Protocol)

Hypertext Transfer Protocol (HTTP)

User Datagram Protocol (UDP)

4.

Question 4

Fill in the blank: A DNS record that’s used to redirect traffic from one domain name to another is known as a _______ record.

1 / 1 point

SQA

CNAME

NS

QUAD A

5.

Question 5

Which portion of a domain is known as the ‘www” portion?

1 / 1 point

The Top Level Domain (TLD) name

The Dynamic Host Configuration Protocol (DHCP)

The DNS Resolver

The subdomain

6.

Question 6

Which address does the field in DHPOFFER specify?

0 / 1 point

The Gateway address

The Data Link Layer

The Media Access Control (MAC) address

The Internet Protocol (IP) address

7.

Question 7

Network Address Translation (NAT) is typically implemented with which of these hardware devices?

1 / 1 point

Switches

Hubs

Servers

Routers

8.

Question 8

What technique is used with Network Address Translation (NAT) when a source port chosen by a client is the same port used by a router?

0 / 1 point

Translation

Masquerading

Preservation

Forwarding

9.

Question 9

Which of these technologies uses encrypted tunnels to allow for a remote computer or network to act as if it’s connected to a network that it’s not actually physically connected to?

1 / 1 point

Domain Name System (DNS)

User Datagram Protocol (UDP)

Dynamic Host Configuration Protocol (DHCP)

Virtual Private Network (VPN)

10.

Question 10

Fill in the blank: A service that appears to external clients as a single server, but actually represents many servers behind it, is known as a _____.

1 / 1 point

reverse proxy

VPN

port preservation

multiplexer

Limitations of the Internet

1.

Question 1

A modulator/demodulator is better known as a what?

1 / 1 point

computer

telephone

modem

radio

2.

Question 2

What term is used to refer to any internet connectivity technology that isn’t dial-up?

1 / 1 point

Ethernet

Plain Old Telephone System (POTS)

Broadband

Fast Internet

3.

Question 3

How many T1 lines make up one T3 line?

1 / 1 point

100

3

24

28

4.

Question 4

What is the more accurate name for a DSL modem?

1 / 1 point

ONT

CMTS

POTS

DSLAM

5.

Question 5

What connects lots of different cable connections to an ISP’s core network?

1 / 1 point

ONT

CMTS

POTS

DSLAM

6.

Question 6

What does FTTP stand for?

1 / 1 point

File Transfer Telephone Protocol

Fiber to the People

Fiber Telephone Total Package

Fiber to the Premises

7.

Question 7

A section of the radio spectrum that’s been agreed upon to be used for certain communications is known as a what?

1 / 1 point

A wireless LAN

A frequency band

A collision domain

A channel

8.

Question 8

In which type of wireless configuration do nodes communicate directly with each other, rather than with an access point or any other supporting infrastrucuture?

1 / 1 point

Ad-hoc

Mesh network

802.11b

2.4Ghz

Correct

9.

Question 9

What wireless security method allows you to configure access points to only allow connections from specific physical addresses belonging to devices you trust?

1 / 1 point

5Ghz Channel

Media Access Control (MAC) filtering

Wired Equivalent Privacy (WEP)

WiFi Protected Access (WPA)

10.

Question 10

Cellular networking is also known as ____ networking.

0 / 1 point

computer

mobile

wide area

organic

Troubleshooting and the Future of Networking

1.

Question 1

The ability for a protocol or program to determine that something went wrong is known as ________.

1 / 1 point

data resilience

data verification

error detection

redundancy

2.

Question 2

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

1 / 1 point

TTL

ICMP

Echo request

Echo reply

3.

Question 3

Traceroute uses UDP packets by default on which of the following operating systems? (Choose all that apply)

0.75 / 1 point

Windows 7

Linux

Correct

Mac OS

Windows 10

4.

Question 4

When using the netcat command to test a network port, which option will provide output that is not useful for scripting, but is useful for the human eye?

1 / 1 point

-v

-z

-Port

No option is required

5.

Question 5

While in an interactive nslookup session, you’d use the ______ keyword to change the DNS server you’re using.

1 / 1 point

Client

DNS

FQDN

Server

6.

Question 6

When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support?

0 / 1 point

Paths between nodes

ICMP echo requests

Virtualization services

Port connectivity

7.

Question 7

A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used?

1 / 1 point

Private

Hybrid

Public

Community

8.

Question 8

Internet Protocol (IP) v6 addresses are written out in which format?

1 / 1 point

4 groups of 16 bits

8 groups of 12 bits

8 groups of 16 bits

6 groups of 32 bits

9.

Question 9

Which of the options below represents the correct & most fully compressed version of the IPv6 address: 7d2b:00a9:a0c4:0000:a772:00fd:a523:0358

1 / 1 point

7d2b:a9:a0c4:0:a772:fd:a523

7d2b:a9:a0c4::a772:fd:a523:358

7d2b:00a9:a0c4:0000:a772

7d2b:a9:a0c4:0:a772:fd:a523:358

10.

Question 10

Which Internet Protocol (IP) v6 header field is used to determine the quality of service level for a datagram?

1 / 1 point

Next header

Version

Flow label

Payload length

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *